Jump to content

Dumb Noobs


Guest Deleted_Account
 Share

Recommended Posts

Guest Deleted_Account

First, before i make fun of this guy (my friend) i shall list my defenses:

 
1) IDS/IPS
2) 3 firewalls (Alpha Shield, pFsense, Router)
3) 3 more additional software Firewalls (Comodo on windows, Shorewall on linux and Fedora 12's built in firewall on fedora)
4) LAN separated from WLAN
5) WHOLE DISK ENCRYPTION (physical security)
6) PSAD (Port Scan Attack Detector)
7) LSAT (Linux Secruity Audit Tool)
8) SNORT :)
9) WIDS

So essentially my friend wanted to get "file A" off of my laptop so he did this ( I Gave him the WPA key):

1) Connected to my network

==> woops WIDS is set so sensitive that ANY mac addy not in the White List sets off alarms (Audio Alarms :) )

2) nmap => Detected and blocked

3) Stealth Scans => all ports FILTERED

4) Metalsploit auto_pwn => failed

5) tries physical access

6) TC/LUKS HDD ENCRPYTION plus BIOS and HDD LOCKS == STOPPED :)

He failed as well did the other noob (Unknown stranger) who tried to DOS my wifi with BT4's python script (cant remember the name)

just thought someone may be interested in how noobs go beaten today :D

Link to comment
Share on other sites

I am pretty sure there are other ways to secure the network better, but what you did should put any attacker begging for mercy. Good work dude. That's pretty damn secured.

Edited by Infiltrator
Link to comment
Share on other sites

Guest Deleted_Account
I am pretty sure there are other ways to secure the network better, but what you did should put any attacker begging for mercy. Good work dude. That's pretty damn secured.

agreed, i am actually looking for a better way, i did it like this because it didnt cost much but in the future it may not be enough :S as for begging for mercy i doubt hell be back i setup a honeypot just in case so i can mess with him :)

Link to comment
Share on other sites

I hate to say it but I would not tout any network as being secure..

There is always a way.

You are right there could be security loop holes or anything similar waiting to be exploited.

Link to comment
Share on other sites

Depends on how hard he's going to try and get the file. Instead of cracking your computer what he's more likely to do is smash the fuck out of you until you tell him the password. It'll be a lot easier and faster probably.

Link to comment
Share on other sites

Guest Deleted_Account
I hate to say it but I would not tout any network as being secure..

There is always a way.

True however by secure i mean the approximate amount of time it would take to break in, for instance, the US military declares AES-256 bit XTS mode "secure" NOT because it is 100% unbreakable but because to this day there is NO feasible attack against (not talking about password bruteforcing/gathering here) it. AES-256 bit in CBC mode however has an attack and as such is not considered as "secure" but still secure enough for classified documents vs XTS and Top-secret level data. So when I, and most people in general, say we are secure we dont mean 100% no one can get in we mean it would take months of effort and pre-meditation to get in. For instance to break in to my network (or even a more secure network) it would take months just to break into the WLAN which is isolated from the LAN not much point unless you are specifically targeting me, which i doubt would happen.

Should have just let him on and did an upside-down-ternet :P

haha good point; maybe i should hide the SSID to my normal Wifi setup a fake one so he cracks it and gets some upside-down-ternet or maybe a little fun with airpwn :P

Depends on how hard he's going to try and get the file. Instead of cracking your computer what he's more likely to do is smash the fuck out of you until you tell him the password. It'll be a lot easier and faster probably.

This is not very likely to happen lol i highly doubt that since, again, he would have to have pre-meditated it and specifically came after me which i doubt, considering if he did you would think he would be slightly more talented with hacking and not just a complete noob using someone's script and failing badly. Also the "beat up" scenario would not work in my case, most often at least, as i have my level 3 hand to hand combat training so i think most of the time i should be fine in that case :P not to mention i would just give them the outer volume :P

Link to comment
Share on other sites

How IT savvy is this friend of yours. Do you think he stands a chance?

Link to comment
Share on other sites

Guest Deleted_Account
How IT savvy is this friend of yours. Do you think he stands a chance?

He has adequate knowledge doubt he will make it in though the other guy didnt thats for sure my friends failed before but know he has gotten better with Metasploit he thinks he can find a way in :P so ya i doubt it but i could be wrong

30 minutes in a windowless room with an electric drill, claw hammer & pliers and I could have any volume of passwords I wanted.

lol i somehow doubt that would happen also note you., or the attacker, would end up in jail for life lol would it really be worth that :P also what if i just gave you dud volumes you would never know which were real or not for all you know i could have 5 volumes each with a outer and hidden volume only ONE out of the FIVE volumes is real and that would mean there are TEN volumes five hidden five outer now lets say 3 out of five are hidden in video files (steg.) and another 2 are in the cloud what now? lol 2 of them i could deny having completely the 3 that are hidden lets say a 1080p HD video like "Planet Earth" so whats that 30GB file? i could stuff a Volume in there and it would look like nothing any different ;p and you would have no clue they are there only know the ones i reveal lets say the one thats on my 1TB external :P just saying, if you dont know its there how will you find it? lol

also why would this scenario EVER happen? My data is A) Not illegal (as cracked games/music/video arent illegal in canada :) ) B) its Not Black mail or some Uber top-secret government document lol so i would personally never have to worry about this scenario :P

EDIT: Forgot to mention on my pc i have a few volumes riged (fake ones) if they are opened a .sh script runs and securely removes (wipes) all volumes my encrypted partition and finally resets my passwords and reboots thus locking the attacker out (Full disk encryption password is also changed) and removing the data they wanted.

Edited by x942
Link to comment
Share on other sites

Mainly because I suspect that your basic human desire to stay alive and in one piece will over rule any cunning plans you can come up with to hide your data. From my experience this is always true. You can brag all you want, but your only human and that's your weak point.

Link to comment
Share on other sites

He has adequate knowledge doubt he will make it in though the other guy didnt thats for sure my friends failed before but know he has gotten better with Metasploit he thinks he can find a way in :P so ya i doubt it but i could be wrong

lol i somehow doubt that would happen also note you., or the attacker, would end up in jail for life lol would it really be worth that :P also what if i just gave you dud volumes you would never know which were real or not for all you know i could have 5 volumes each with a outer and hidden volume only ONE out of the FIVE volumes is real and that would mean there are TEN volumes five hidden five outer now lets say 3 out of five are hidden in video files (steg.) and another 2 are in the cloud what now? lol 2 of them i could deny having completely the 3 that are hidden lets say a 1080p HD video like "Planet Earth" so whats that 30GB file? i could stuff a Volume in there and it would look like nothing any different ;p and you would have no clue they are there only know the ones i reveal lets say the one thats on my 1TB external :P just saying, if you dont know its there how will you find it? lol

also why would this scenario EVER happen? My data is A) Not illegal (as cracked games/music/video arent illegal in canada :) ) B) its Not Black mail or some Uber top-secret government document lol so i would personally never have to worry about this scenario :P

EDIT: Forgot to mention on my pc i have a few volumes riged (fake ones) if they are opened a .sh script runs and securely removes (wipes) all volumes my encrypted partition and finally resets my passwords and reboots thus locking the attacker out (Full disk encryption password is also changed) and removing the data they wanted.

Damn you must be really paranoid about security. But I like very much your idea of deleting, encrypting and lock out the machine completely. If it was me, I would rig my entire house with explosives and making sure the intruder does not leave to tell a tale.

Link to comment
Share on other sites

30 minutes in a windowless room with an electric drill, claw hammer & pliers and I could have any volume of passwords I wanted.

The Autopwn of social engineering, I'd say, except it requires more effort while success rate is much higher.

Link to comment
Share on other sites

Mainly because I suspect that your basic human desire to stay alive and in one piece will over rule any cunning plans you can come up with to hide your data. From my experience this is always true. You can brag all you want, but your only human and that's your weak point.

Finally someone understands what the weakest link of a security system is.

Link to comment
Share on other sites

Finally someone understands what the weakest link of a security system is.

The human factor.

Link to comment
Share on other sites

Well, IMHO it's not really the question of how much security you have but why? Sounds a bit like an ole' PITA and $$ to have that stuff for just some home connection. You do know, once info is out of that nifty firewall box you have, security is only as good as what your connected to supports.

I feel I have a decent amount of security on mine. It's called the shut down button. Yes I have a built in firewall, firewall this, and firewall that. Security software, antivirus/malware/etc. etc. etc. but I don't feel there is much need for hard effort. If someone is going to want to compromise your data, they are going to want data that's worth more than just 1cent to the average joe. This would be credit cards and etc. And if someone is going to want to get that, then they might as well just redirect the traffic from a backbone router, or spoof a Frame Relay port. Just sayin'.

My suggestion is you should check out the PIX emulators and/or get Juniper or JunOS. It's solid and does the job pretty well.

Edited by h3%5kr3w
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...